CUSTOMER BLOG: Share your opinion and support the Chicago Tech Academy! Kenna Security. Feb 20, 2019 With one of our main offices in the Chicago area, the West Loop to be specific, we’re a big fan... Read More >
From the Desk of the CEO: Looking Back to Look Forward Karim Toubba. Feb 19, 2019 With our employee all-hands and sales kickoff event just behind us and RSAC coming in early March, I wanted to... Read More >
Power to the Partner! Rick Kramer. Feb 13, 2019 Just a few weeks ago I headed off to Chicago—yes, into the polar vortex—to join my colleagues and friends at... Read More >
All These Vulnerabilities Rarely Matter Jonathan Cran. Feb 12, 2019 As security professionals, we’ve all been in a situation where we’ve been presented with a large list of vulnerabilities in... Read More >
No Pain, No Gain: Why Shifting to DevOps Is Worth It for Your Organization Jerry Gamblin. Feb 06, 2019 I’ve been pretty vocal lately about the need to shift security left and introduce it earlier in the development lifecycle.... Read More >
Standard Vulnerability Management Isn’t Enough Jeff Aboud. Jan 23, 2019 There are dozens of vulnerability scanners on the market today. Their job is to do exactly what their name implies—scan... Read More >
When Vulnerability Management Stops Being Polite & Starts Getting Real Ed Bellis. Jan 22, 2019 In my post in December, “Vulns Will Survive,” I shared some interesting data about the survivability rate of vulnerabilities in... Read More >
Industry Benchmarks: You Can Get With This, Or You Can Get With That Ed Bellis. Jan 03, 2019 In my previous role as a CISO, I probably received two questions far more than any others. The first, "Are... Read More >
CUSTOMER BLOG: Submit Your Feedback for a Chance to Win Kenna Security. Dec 13, 2018 Hey, Kenna Customers! Want to “get away” from all of this winter? Your review could net you a brand-new VR... Read More >
Application Vulnerability Management Requires a Risk-based Approach Jeff Aboud. Dec 12, 2018 Application security teams face unique and often daunting challenges. It’s their job to protect the organization from application vulnerabilities that... Read More >